1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
7

How would a top margin be set

Computers and Technology
1 answer:
OlgaM077 [116]3 years ago
6 0
You need to be more specific. Because to set a top-margin in CSS you would set it like the following:

margin-top: 5px; 
You might be interested in
2.
Sauron [17]
Im pretty sure it is b
7 0
3 years ago
Computer virus is a<br> a. software<br> b. hardware<br> c. bacteria<br> d. none of these
Nimfa-mama [501]
The answer is software
8 0
4 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
The computers found in DVD players, thermostats, answering machines, and some appliances are known as ____.
Pani-rosa [81]
The computers found in DVD players, thermostats, answering machines, and some appliances are known as embedded computers.
So the answer is <span><span>d. embedded computers</span></span>
5 0
3 years ago
When water reaches the pole, most of it turns to ice. Some salt is trapped between ice crystals, but most is left behind in the
astra-53 [7]

Answer:

b should be the right answer

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Describe the objectives of e-commerce?​
    13·1 answer
  • State three differences between a hard drive and a pen drive​
    6·1 answer
  • which of the following is an educated or informed guess that is proposed and supported with verifiable evidence
    12·1 answer
  • Which function will add a grade to a student's list of grades in Python? add() append() print() sort()
    5·2 answers
  • Which of the following is ideal for long distance communication ?
    5·1 answer
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • one data is in memory the computer interpets and executeinstructions to process the data into informationA. TrueB. False
    8·1 answer
  • A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number
    10·1 answer
  • In which step of web design is storyboarding helpful?
    10·1 answer
  • Plzzz help ya girl out due soon
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!